Giuri et al., A role-based secure database design tool, Computer security foundation workshop, Proceed. of the sixth annual, pp. 203-212, Jul. 1996. |
Peri et al., Formal specification of information flow security policies and their enforcement in security critical systems, Computer security foundation workshop, 1994 CSFW 7 Proceed., pp. 118-125, Jun. 1994. |
Mao et al., Development of authentication protocols: some misconceptions and a new approach, Computer security foundation workshop, 1994 Proceed., pp. 178-186, Jun. 1994. |
Williams et al., Automated support for external consistency, Computer security applications conference, 1994 Proceeds., pp. 71-81, May 1993. |
Garfinkel et al., Book: Practical UNIX Security, pp. 125-130, Jun. 1991. |